Pages - Menu

Tuesday, May 12, 2026

70+ BUSINESS ANALYST QUESTIONS AND ANSWERS

 


Section 1: Fundamentals of Business Analytics (1–15)

  1. What is the main objective of Business Analytics?
    A. Data storage
    B. Data visualization only
    C. Data-driven decision making
    D. Database management
     Answer: C
  2. Which of the following is NOT a type of analytics?
    A. Descriptive
    B. Predictive
    C. Prescriptive
    D. Curative
     Answer: D
  3. Which analytics type answers “What happened?”
    A. Descriptive
    B. Predictive
    C. Diagnostic
    D. Prescriptive
     Answer: A
  4. Which analytics type focuses on future trends?
    A. Descriptive
    B. Predictive
    C. Diagnostic
    D. Cognitive
     Answer: B
  5. Which of the following is a Business Intelligence tool?
    A. MySQL
    B. Python
    C. Power BI
    D. GitHub
     Answer: C
  6. KPI stands for:
    A. Key Performance Indicator
    B. Knowledge Performance Index
    C. Key Processing Indicator
    D. Known Performance Input
     Answer: A
  7. Which of the following is a structured data format?
    A. Image
    B. PDF
    C. SQL table
    D. Video
     Answer: C
  8. Dashboards in analytics are used for:
    A. Writing reports
    B. Managing code
    C. Visualizing KPIs
    D. Testing APIs
     Answer: C
  1. What is the first step in business analytics?
    A. Build the model
    B. Data interpretation
    C. Problem definition
    D. Deployment
     Answer: C
  2. SWOT analysis helps in:
    A. Data storage
    B. Statistical modeling
    C. Strategic decision-making
    D. Time series forecasting
     Answer: C
  3. Which software is commonly used for Business Analytics?
    A. AutoCAD
    B. SAP
    C. PowerPoint
    D. Tally
     Answer: B
  4. Which type of analytics provides “what-if” analysis?
    A. Descriptive
    B. Predictive
    C. Diagnostic
    D. Prescriptive
     Answer: D
  5. ETL stands for:
    A. Evaluate, Test, Launch
    B. Extract, Transform, Load
    C. Execute, Transfer, Link
    D. Explore, Transfer, Learn
     Answer: B
  6. Which of these is a data visualization library in Python?
    A. Matplotlib
    B. NumPy
    C. Pandas
    D. Scikit-learn
     Answer: A
  7. An outlier in business data refers to:
    A. A missed observation
    B. An error in system
    C. A data point that deviates significantly from others
    D. An average value
     Answer: C

Section 2: Statistical Tools & Techniques (16–30)

  1. Which of the following measures central tendency?
    A. Mean
    B. Variance
    C. Standard deviation
    D. Correlation
     Answer: A
  2. The probability of an impossible event is:
    A. 0
    B. 1
    C. 100
    D. Undefined
     Answer: A
  3. What does the p-value in hypothesis testing indicate?
    A. Model accuracy
    B. Likelihood of null being true
    C. Significance of results
    D. R-squared
     Answer: C
  4. Which statistical test compares means of two groups?
    A. Chi-square test
    B. ANOVA
    C. T-test
    D. Z-test
     Answer: C
  5. Standard deviation measures:
    A. Central value
    B. Data correlation
    C. Spread or dispersion of data
    D. Linearity
     Answer: C
  6. Which graph is best for categorical data?
    A. Line graph
    B. Histogram
    C. Bar chart
    D. Scatter plot
     Answer: C
  7. Which chart shows data distribution over intervals?
    A. Histogram
    B. Pie chart
    C. Bar graph
    D. Line chart
     Answer: A
  8. Correlation ranges from:
    A. 0 to 1
    B. -1 to 1
    C. -100 to +100
    D. 0 to infinity
     Answer: B
  9. What does R-squared indicate?
    A. Correlation strength
    B. Model fit to data
    C. Significance level
    D. Prediction error
     Answer: B
  1. Which distribution is bell-shaped and symmetric?
    A. Normal
    B. Binomial
    C. Uniform
    D. Exponential
     Answer: A
  2. In a right-skewed distribution, the mean is:
    A. Greater than median
    B. Equal to median
    C. Less than median
    D. Undefined
     Answer: A
  3. What is a population in statistics?
    A. Sample subset
    B. Data file
    C. Entire group being studied
    D. Filtered records
     Answer: C
  4. Which test is used for categorical variable relationships?
    A. Z-test
    B. T-test
    C. Chi-square test
    D. ANOVA
     Answer: C
  5. Which method is used for forecasting trend data?
    A. Time Series
    B. Regression
    C. Classification
    D. Clustering
     Answer: A
  6. Which statistic shows relationship strength between two variables?
    A. Variance
    B. Mean
    C. Correlation
    D. Skewness
     Answer: C

 

Section 3: Predictive Modeling & Forecasting (31–45)

  1. Which technique is best for predicting numerical values?
    A. Classification
    B. Regression
    C. Clustering
    D. Association
     Answer: B
  2. Which model type is used for customer segmentation?
    A. Regression
    B. Clustering
    C. Classification
    D. Neural networks
     Answer: B
  3. Decision trees are mainly used for:
    A. Forecasting time
    B. Descriptive statistics
    C. Classification and regression
    D. Dashboards
     Answer: C
  4. Which of the following is a supervised learning algorithm?
    A. K-means
    B. Apriori
    C. Decision Tree
    D. PCA
     Answer: C
  5. Which model helps predict binary outcomes (yes/no)?
    A. Linear regression
    B. Logistic regression
    C. Decision trees
    D. KNN
     Answer: B
  6. Overfitting occurs when a model:
    A. Generalizes well
    B. Is too simple
    C. Fits training data too closely
    D. Uses fewer features
     Answer: C
  7. Which evaluation metric is best for classification models?
    A. MAE
    B. RMSE
    C. Accuracy
    D. R-squared
     Answer: C
  8. Which algorithm is not used for classification?
    A. Logistic Regression
    B. Random Forest
    C. K-means
    D. Naïve Bayes
     Answer: C
  9. Which technique is used to reduce dimensionality?
    A. Clustering
    B. PCA
    C. Regression
    D. Decision Tree
     Answer: B
  10. Which of the following is a time-series forecasting model?
    A. ARIMA
    B. Naïve Bayes
    C. Decision Tree
    D. SVM
     Answer: A
  11. Which metric is used to evaluate regression models?
    A. Precision
    B. Recall
    C. RMSE
    D. Confusion Matrix
     Answer: C
  12. Which of these is not a machine learning model?
    A. Linear Regression
    B. K-means
    C. SWOT
    D. Decision Tree
     Answer: C
  13. Which algorithm is suitable for anomaly detection?
    A. Clustering
    B. Linear regression
    C. Logistic regression
    D. PCA
     Answer: A
  14. What is the role of a confusion matrix?
    A. Identify model bias
    B. Evaluate classification performance
    C. Visualize trends
    D. Perform clustering
     Answer: B
  15. Precision is defined as:
    A. TP / (TP + FP)
    B. TP / (TP + FN)
    C. TN / (TN + FP)
    D. TP / (TP + TN)
     Answer: A

 

Section 4: Decision-Making & Case-Based Reasoning (46–60)

  1. What is a decision support system (DSS)?
    A. A website
    B. A server-based application
    C. A system that supports business decision-making
    D. A reporting tool
     Answer: C
  2. Which model helps in portfolio risk analysis?
    A. Regression
    B. Monte Carlo simulation
    C. Clustering
    D. PCA
     Answer: B
  3. Business rules in analytics are often derived from:
    A. Dashboards
    B. Data mining
    C. SQL queries
    D. Data cleaning
     Answer: B
  4. Case-based reasoning involves:
    A. Guessing past decisions
    B. Automating model building
    C. Reusing past solutions for new problems
    D. Cleaning data
     Answer: C
  1. Which technique helps visualize cause-and-effect relationships?
    A. Histograms
    B. Fishbone diagram
    C. Pie charts
    D. Line graphs
     Answer: B
  2. Which framework helps prioritize business initiatives?
    A. RACI
    B. Eisenhower Matrix
    C. BCG Matrix
    D. SWOT
     Answer: C
  3. Which metric evaluates customer lifetime value?
    A. CLV
    B. NPV
    C. CAGR
    D. ROI
     Answer: A
  4. Which concept helps measure customer satisfaction?
    A. KPI
    B. CLV
    C. NPS
    D. LTV
     Answer: C
  5. Net Present Value (NPV) is used for:
    A. Cost tracking
    B. Long-term profitability analysis
    C. Short-term cash forecasting
    D. Customer segmentation
     Answer: B
  6. Which technique is used for decision optimization?
    A. Regression
    B. Linear programming
    C. Classification
    D. Logistic regression
     Answer: B
  7. Which of the following measures project efficiency?
    A. Payback period
    B. Lead conversion
    C. Net Promoter Score
    D. Funnel ratio
     Answer: A
  8. What does the Pareto principle suggest?
    A. 80% of effects come from 20% of causes
    B. 50% effort gives 50% output
    C. Balanced analysis gives perfect results
    D. Random behavior produces consistent patterns
     Answer: A
  9. KPI dashboards are commonly used by:
    A. Developers
    B. Sales and Marketing teams
    C. Database admins
    D. Network engineers
     Answer: B
  10. Which method helps understand root cause of problems?
    A. 5 Whys
    B. Decision Tree
    C. Pie chart
    D. PCA
     Answer: A
  11. Balanced Scorecard is a tool for:
    A. Machine learning
    B. Web analytics
    C. Strategic management
    D. Code optimization
     Answer: C

 

Section 5: Real-World Applications & Tools (61–75)

  1. CRM analytics helps in analyzing:
    A. Finance
    B. Supply chain
    C. Customer behavior
    D. HR records
     Answer: C
  2. Which platform offers drag-and-drop dashboard design?
    A. Excel
    B. Python
    C. Tableau
    D. Hadoop
     Answer: C
  3. What does OLAP stand for?
    A. Online Analytical Processing
    B. Offline Analytics Performance
    C. Online Application Layer
    D. Operational Learning AI Program
     Answer: A
  4. Which language is widely used in business analytics scripting?
    A. HTML
    B. Java
    C. R
    D. C++
     Answer: C
  5. Which tool is most commonly used for SQL-based analytics?
    A. Python
    B. PostgreSQL
    C. Tableau
    D. Excel
     Answer: B
  6. Which company uses analytics for personalized shopping recommendations?
    A. FedEx
    B. Netflix
    C. Google Maps
    D. GitHub
     Answer: B
  7. Which method is used in A/B testing?
    A. Experimental design
    B. Regression
    C. Classification
    D. Forecasting
     Answer: A
  8. Which industry uses churn prediction extensively?
    A. Agriculture
    B. Telecom
    C. Manufacturing
    D. Mining
     Answer: B
  9. What is data wrangling?
    A. Storing large data
    B. Cleaning and preparing raw data
    C. Compressing big data
    D. Querying JSON files
     Answer: B
  10. A Sankey diagram is used to show:
    A. Circular flows
    B. Resource distribution
    C. Flow of data/values between nodes
    D. Time trends
     Answer: C
  11. Which of these is NOT a benefit of business analytics?
    A. Cost efficiency
    B. Random sampling
    C. Better decision making
    D. Risk mitigation
     Answer: B
  12. Which concept applies analytics to operations?
    A. Data warehousing
    B. Operational analytics
    C. Neural networks
    D. Image processing
     Answer: B
  13. Which metric shows how many leads convert to customers?
    A. ROI
    B. CLV
    C. Conversion rate
    D. Retention score
     Answer: C
  14. Which technology supports real-time analytics?
    A. Hadoop
    B. Spark
    C. Tableau
    D. Excel
     Answer: B
  15. Which of the following platforms integrates dashboards and BI in the cloud?
    A. Amazon EC2
    B. Azure Synapse
    C. Power BI
    D. Notepad++
     Answer: C

 

Sunday, May 3, 2026

SYSTEM ADMINISTRATOR MOCK INTERVIEW EXAM

 


System Administrator Mock Interview Exam 


1. Which IP address is private?
A. 8.8.8.8
B. 172.16.5.4
C. 1.1.1.1
D. 192.0.2.1

2.What is the default port for HTTPS?
A. 80
B. 21
C. 443
D. 25

3.Which OSI layer handles routing?
A. Data Link
B. Network
C. Session
D. Transport

4.What does the CIA triad stand for?
A. Control, Integrity, Access
B. Confidentiality, Integrity, Availability
C. Control, Inspection, Audit
D. Confidentiality, Inspection, Access

5.In Linux, which command adds a user?
A. adduser
B. usermod
C. useradd
D. newuser

6.A subnet mask of 255.255.255.0 corresponds to which CIDR?
A. /16
B. /24
C. /8
D. /32

7.Which protocol uses port 22?
A. FTP
B. SSH
C. Telnet
D. SMTP

8.What is the main principle of Zero Trust?
A. Trust internal users
B. Trust verified devices
C. Never trust, always verify
D. Trust network perimeter

9.Which command shows running processes in Linux?
A. ps
B. ls
C. cat
D. who

10.Which command schedules jobs?
A. at
B. cron
C. schedule
D. jobrun

11.You cannot SSH into a server. What should you check first?
A. CPU usage
B. SSH service status
C. Disk size
D. User password length

12.Which tool is used for configuration management?
A. Docker
B. Ansible
C. Git
D. Apache

13.Which file stores user account info?
A. /etc/group
B. /etc/passwd
C. /etc/shadow
D. /etc/users

14.What does chmod 755 do?
A. Full access for all
B. Owner full, others read/execute
C. Read only
D. No access

15.Which port does DNS use?
A. 80
B. 53
C. 22
D. 25

16.Which command checks disk usage?
A. df
B. du
C. disk
D. usage

17.Which tool monitors system performance in real time?
A. ls
B. top
C. pwd
D. cat

18.A server is slow. What should you check first?
A. Background image
B. CPU, RAM, Disk
C. Username
D. IP address

19.Which protocol is connection-oriented?
A. UDP
B. TCP
C. ICMP
D. ARP

20.Which command installs packages in Ubuntu?
A. yum install
B. apt install
C. install pkg
D. dpkg start

21.What is the purpose of a firewall?
A. Encrypt data
B. Monitor CPU
C. Filter network traffic
D. Manage users

22.Which command creates a group?
A. addgroup
B. groupadd
C. newgroup
D. creategroup

23.Which Linux directory stores logs?
A. /home
B. /var/log
C. /etc/log
D. /logs

24.Which backup type copies only changed data since last backup?
A. Full
B. Incremental
C. Differential
D. Snapshot

25.What does ping test?
A. Disk
B. Connectivity
C. CPU
D. Memory


26.
Which command restarts a service?
A. service restart
B. systemctl restart
C. restart svc
D. reboot service

27.Which Kubernetes component schedules pods?
A. kubelet
B. scheduler
C. controller
D. proxy

28.What is least privilege?
A. Full access for admins
B. Minimum access required
C. Shared accounts
D. Guest access

29.Which command shows IP address?
A. ip a
B. ipconfig
C. netstat
D. route

30.Which tool is used for log analysis?
A. Splunk
B. Docker
C. Jenkins
D. Nginx

31.Which command checks open ports?
A. netstat -tuln
B. lsports
C. show ports
D. portlist

32.Which OSI layer handles encryption?
A. Application
B. Presentation
C. Network
D. Physical

33.A disk is full. What command helps find large files?
A. find / -size +100M
B. ls big
C. diskcheck
D. scan

34.What is RAID 1?
A. Striping
B. Mirroring
C. Parity
D. Backup

35.Which command changes file ownership?
A. chmod
B. chown
C. changeuser
D. ownfile

36.Which port is used by FTP?
A. 21
B. 22
C. 80
D. 110

37.Which tool visualizes metrics?
A. Grafana
B. Apache
C. Bash
D. Vim

38.What does systemctl do?
A. File editing
B. Service management
C. Networking
D. Disk management

39.Which command backs up files?
A. cp
B. rsync
C. mv
D. rm

40.Which type of attack floods a server?
A. Phishing
B. DoS
C. MITM
D. SQL Injection

41.Which file stores encrypted passwords?
A. /etc/passwd
B. /etc/shadow
C. /etc/security
D. /etc/auth

42.Which command edits crontab?
A. cronedit
B. crontab -e
C. editcron
D. jobedit

43.What is Kubernetes used for?
A. Database
B. Container orchestration
C. Firewall
D. Backup

44.Which protocol resolves IP to MAC?
A. DNS
B. ARP
C. TCP
D. HTTP

45.Which compliance framework is international?
A. NIST
B. ISO 27001
C. GDPR
D. Local Act

46.A user cannot access a file. What do you check first?
A. CPU
B. Permissions
C. Disk
D. Network

47.Which command shows memory usage?
A. free -m
B. memcheck
C. topmem
D. showmem

48.Which command tests DNS resolution?
A. nslookup
B. ping
C. route
D. netstat

49.Which is a secure authentication method?
A. Password only
B. MFA
C. Shared login
D. Plain text

50.Database backup in Linux commonly uses:
A. mysqldump
B. dbcopy
C. sqlsave
D. backupdb


 Answer.

1. B — 172.16.5.4
Private IP ranges include 172.16.0.0 – 172.31.255.255, so this falls within that range.

2. C — 443
HTTPS uses port 443 for secure encrypted communication (SSL/TLS).

3. B — Network
The Network layer (Layer 3) is responsible for routing packets between networks.

4. B — Confidentiality, Integrity, Availability
These are the three core principles of information security.

5. C — useradd
useradd is the standard low-level command for creating users in Linux.

6. B — /24
255.255.255.0 corresponds to 24 bits for network, hence /24.

7. B — SSH
SSH (Secure Shell) uses port 22 for secure remote access.

8. C — Never trust, always verify
Zero Trust assumes no user/device is trusted by default, even inside the network.

9. A — ps
ps displays running processes. Example: ps aux.

10. B — cron
cron schedules recurring jobs, while at is for one-time tasks.

11. B — SSH service status
First step: check if SSH daemon is running:
systemctl status sshd

12. B — Ansible
Ansible is widely used for automation and configuration management.

13. B — /etc/passwd
Stores user account details (not passwords). Password hashes are in /etc/shadow.

14. B — Owner full, others read/execute
755 =

Owner: rwx (7)
Group: r-x (5)
Others: r-x (5)

15. B — 53
DNS uses port 53 (UDP primarily, TCP for large queries).

16. A — df
df -h shows disk space usage per filesystem.

17. B — top
top shows real-time CPU, memory, and process activity.

18. B — CPU, RAM, Disk
These are primary performance bottlenecks to check first.

19. B — TCP
TCP is connection-oriented (reliable), unlike UDP.

20. B — apt install
Ubuntu/Debian use apt install for package management.

21. C — Filter network traffic
Firewalls allow/deny traffic based on rules.

22. B — groupadd
Creates new groups in Linux.

23. B — /var/log
System logs (auth, syslog, kernel logs) are stored here.

24. B — Incremental
Backs up only changes since last backup (efficient storage).

25. B — Connectivity
ping checks if a host is reachable over network.

26. B — systemctl restart
Used in modern Linux (systemd systems).

27. B — scheduler
Kubernetes scheduler assigns pods to nodes.

28. B — Minimum access required
Principle of least privilege reduces security risk.

29. A — ip a
Modern command to display IP addresses.

30. A — Splunk
Splunk is used for log analysis and SIEM.

31. A — netstat -tuln
Shows listening ports and services.

32. B — Presentation
Handles encryption, compression, data formatting.

33. A — find / -size +100M
Finds files larger than 100MB.

34. B — Mirroring
RAID 1 duplicates data across disks for redundancy.

35. B — chown
Changes file ownership.

36. A — 21
FTP control channel uses port 21.

37. A — Grafana
Grafana visualizes metrics (often with Prometheus).

38. B — Service management
systemctl manages services (start, stop, restart).

39. B — rsync
Efficient backup tool (incremental + remote sync).

40. B — DoS
Denial of Service overwhelms a system with traffic.

41. B — /etc/shadow
Stores hashed passwords securely.

42. B — crontab -e
Edits user cron jobs.

43. B — Container orchestration
Kubernetes manages containers at scale.

44. B — ARP
Maps IP addresses to MAC addresses.

45. B — ISO 27001
International standard for information security management.

46. B — Permissions
File access issues are usually permission-related.

47. A — free -m
Displays memory usage in MB.

48. A — nslookup
Used to query DNS servers.

49. B — MFA
Multi-Factor Authentication is more secure than passwords alone.

50. A — mysqldump
Common tool for MySQL database backups.